Pub Crawl #53

Image removed.Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

 

Controller Area Network Security 2020  Image removed.    (all)

Controller area networks connect the main electrical units in automobiles. They are relevant to the Science of Security because of their relationship to cyber-physical systems, resiliency, and the Internet of Things.

Control Theory and Security 2020  Image removed.      Image removed.      (all)

In the Science of Security, control theory offers methods and approaches to potentially solve the Science of Security community hard problems in resiliency and composability.

Conversational Agents 2020  Image removed.  Image removed.  Image removed.    (all)

Conversational agents are being developed to allow for fully automated interactions between humans and computers using voice, gestures, and other attributes. For the Science of Security community, this work is relevant to the hard problems in human behavior, scalability, and metrics.

Coupled Congestion Control 2020  Image removed. Image removed.    (all)

Congestion control algorithms are used to quickly restore normal operation of a network when congestion occurs. For the Science of Security community, this work is relevant to resilience and scalability.

DDOS Attack Detection 2020  Image removed.    Image removed.  Image removed.  Image removed.    (all)

Distributed Denial of Service Attacks continue to be among the most prolific forms of attack against information systems. Detection is a key step in dealing the problem. For the Science of Security community, this research is related to the problems of resilience, composability, metrics, and human behavior.

DDOS Attack Mitigation 2020  Image removed.    Image removed.  Image removed.  Image removed.    (all)

Distributed Denial of Service Attacks continue to be among the most prolific forms of attack against information systems. Mitigation is a key step in dealing the problem. For the Science of Security community, this research is related to the problems of resilience, composability, metrics, and human behavior.

DDOS Attack Prevention 2020  Image removed.    Image removed.  Image removed.  Image removed.    (all)

Distributed Denial of Service Attacks continue to be among the most prolific forms of attack against information systems. Prevention is the first step in dealing the problem. For the Science of Security community, this research is related to the problems of resilience, composability, metrics, and human behavior.

I-O Systems Security 2020   Image removed.  (all)

Management of I/O devices is a critical part of the operating system. Entire I/O subsystems are devoted to its operation. These subsystems contend both with the movement towards standard interfaces for a wide range of devices to makes it easier to add newly developed devices to existing systems, and the development of entirely new types of devices for which existing standard interfaces can be difficult to apply. Typically, when accessing files, a security check is performed when the file is created or opened. The security check is typically not done again unless the file is closed and reopened. If an opened file is passed to an untrusted caller, the security system can, but is not required to prevent the caller from accessing the file. The research is relevant to the Science of Security problem of scalability.

Machine Learning 2020  Image removed.  Image removed.  (all)

Machine learning offers potential efficiencies and is an important tool in data mining. However, the “learned” or derived data must maintain integrity. Machine learning can also be used to identify threats and attacks. Research in this field relates to the Science of Security hard problems of resilient architectures, composability, and privacy.

Magnetic Remanence 2020  Image removed.  Image removed.  (all)

Magnetic remanence is the property that allows an attacker to recreate files that have been overwritten. For the Science of Security community, it is a topic relevant to the hard problems of resilience and compositionality and has major implications for the Internet of Things and other cyber physical systems.

Malware Analysis 2020  Image removed.  Image removed.  Image removed.    (all)

Malware analysis, along with detection and classification, is a major issue cybersecurity. For the Science of Security community, malware classification is related to privacy, predictive metrics, human behavior and resiliency.

Malware Analysis and Graph Theory 2020      Image removed.  Image removed.  Image removed.    (all)

Malware analysis is generally signature based. Graph theory has the potential to provide more rigor in analyzing malware as a tool for mining large data sets. For the Science of Security community, malware classification is related to privacy, predictive metrics, human behavior and resiliency.

Malware Classification 2020      Image removed.  Image removed.  Image removed.    (all)

Malware classification, along with detection and analysis, is a major issue cybersecurity. For the Science of Security community, malware classification is related to privacy, predictive metrics, human behavior and resiliency.

MANET Attack Detection 2020  Image removed.    Image removed.  Image removed.      (all)

Security is an important research issue for mobile ad hoc networks (MANETs). The work cited here looks at attack detection. For the Science of Security community, this work relates to the hard problems of resilience, metrics, and compositionality.

MANET Attack Prevention 2020  Image removed.    Image removed.  Image removed.      (all)

Security is an important research issue for mobile ad hoc networks (MANETs). The work cited here looks at attack prevention. For the Science of Security community, this work relates to the hard problems of resilience, metrics, and compositionality.

QR Codes 2020  Image removed.    Image removed.  Image removed.      (all)

Security is an important research issue for mobile ad hoc networks (MANETs). The work cited here looks at attack detection. For the Science of Security community, this work relates to the hard problems of resilience, metrics, and compositionality.

Quantum Computing Security 2020  Image removed.            (all)

While quantum computing is still in its early stage of development, large-scale quantum computers promise to be able to solve certain problems much more quickly than any classical computer using the best currently known algorithms. Quantum algorithms, such as Simon's algorithm, run faster than any possible probabilistic classical algorithm. For the Science of Security, the speed, capacity, and flexibility of qubits over digital processing offers still greater promise and relate to the hard problems of resilience, predictive metrics and composability. To the Science of Security community, they are interest in terms of scalability.

Random Key Generation 2020  Image removed.    Image removed.  Image removed.  Image removed.    (all)

Random and pseudorandom numbers can be used for the generation, exchange, storage, use, and replacement of keys, key servers, cryptographic protocols, and user procedures. For researchers, random key generation is a challenge to create larger scale and faster systems to operate within the cloud and other complex environments, while ensuring validity and not adding weight to the process. For the Science of Security community, it is relevant to scalability, resilience, metrics, and human behavior.

Ransomware 2020  Image removed.  Image removed.  Image removed.  (all)

“Ransomware” is the name given to malicious software that locks a computer until an extorted fee or ransom is paid for the key to unlock it. This ransom is usually paid in bitcoin. For the Science of Security community, there are implications for resiliency, composability, and metrics.

Recommender Systems 2020  Image removed.  Image removed.  Image removed.    (all)

Recommender systems are rating systems filters used to predict a user’s preferences for a particular item. Frequently they are used to identify related objects of interest based on a user’s preference to market similar items. As such they create a problem for cybersecurity and privacy related to the hard problems of human factors, scalability, and resilience.

Relational Database Security 2020  Image removed.    Image removed.  Image removed.  Image removed.    (all)

A majority of enterprises store their most sensitive data in relational databases, including personally identifiable information (PII), financial records, and supply chain information. These databases are also the most frequently hacked. For the Science of Security community, relational database security is important for resilience, composability, human behavior, and metrics.

Remanence 2020  Image removed.  Image removed.  (all)

Magnetic remanence is the property that allows an attacker to recreate files that have been overwritten. For the Science of Security community, it is a topic relevant to the hard problems of resilience and compositionality and has major implications for the Internet of Things and other cyber physical systems.

Repudiation 2020  Image removed.    Image removed.  Image removed.  Image removed.    (all)

Repudiation and non-repudiation are core topics in cybersecurity. For the Science of Security community, they relate to resilience, human behavior, metrics, and composability.

Resiliency 2020        Image removed.      (all)

Resiliency of cybersecurity systems and their development is one of the five major hard problems in the Science of Security.

Resilient Security Architectures 2020        Image removed.      (all)

The development of resilient security architectures is one of the five hard problems for the Science of Security.

Return Oriented Programming 2020  Image removed.      Image removed.  Image removed.    (all)

Memory corruption attacks account for many security breaches afflicting software systems. Return-oriented programming (ROP) techniques are often used to bypass the most common memory protection systems. For the Science of Security community, this research is related to resilience, scalability, composability and human factors.

RFIDs 2020        Image removed.  Image removed.    (all)

Radio frequency identification (RFID) has become a ubiquitous identification system used to provide positive identification for items as diverse as cheese and pets. Research into RFID technologies continues and the security of RFID tags is being increasingly questioned. This work is related to the Science of Security issues of resiliency and human behaviors.

Science of Security 2020  Image removed.  Image removed.  Image removed.  Image removed.  Image removed.    (all)

Many more articles and research studies are appearing with “Science of Security” as a keyword. The articles cited here discuss the degree to which security is a science and various issues surrounding its development, ranging from basic approach to essential elements. The articles cited here address the fundamental concepts of the Science of Security.

Scientific Computing Security 2020  Image removed.    Image removed.  Image removed.      (all)

Scientific computing is concerned with constructing mathematical models and quantitative analysis techniques and using computers to analyze and solve scientific problems. As a practical matter, scientific computing is the use of computer simulation and other forms of computation from numerical analysis and theoretical computer science to solve specific problems such as cybersecurity. For the Science of Security community, it relates to predictive metrics, compositionality, and resilience.

 

 

 

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests for removal via email of the links or modifications to specific citations. Please include the URL of the specific citation in your correspondence.

 

Pub Crawl contains bibliographical citations, abstracts if available, links on specific topics, and research problems of interest to the Science of Security community.

How recent are these publications?

These bibliographies include recent scholarly research on topics that have been presented or published within the stated year. Some represent updates from work presented in previous years; others are new topics.

How are topics selected?

The specific topics are selected from materials that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are also chosen for their usefulness for current researchers.

How can I submit or suggest a publication?

Researchers willing to share their work are welcome to submit a citation, abstract, and URL for consideration and posting, and to identify additional topics of interest to the community. Researchers are also encouraged to share this request with their colleagues and collaborators.

What are the hard problems?

Select a hard problem to retrieve related publications.

  1. Image removed. - Scalability and Composability: Develop methods to enable the construction of secure systems with known security properties from components with known security properties, without a requirement to fully re-analyze the constituent components.
  2. Image removed. - Policy-Governed Secure Collaboration: Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains.
  3. Image removed. - Security Metrics Driven Evaluation, Design, Development, and Deployment: Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.
  4. Image removed. - Resilient Architectures: Develop means to design and analyze system architectures that deliver required service in the face of compromised components.
  5. Image removed. - Understanding and Accounting for Human Behavior: Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties.
 
Submitted by Anonymous on